Container Platform Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The container platform must notify the system administrator (SA) and information system security officer (ISSO) of account enabling actions.
<VulnDiscussion>Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of re-establ...Rule Medium Severity -
SRG-APP-000340
<GroupDescription></GroupDescription>Group -
The container platform must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
<VulnDiscussion>Controlling what users can perform privileged functions prevents unauthorized users from performing tasks that may expose dat...Rule Medium Severity -
SRG-APP-000342
<GroupDescription></GroupDescription>Group -
Container images instantiated by the container platform must execute using least privileges.
<VulnDiscussion>Containers running within the container platform must execute as non-privileged. When a container can execute as a privileged...Rule Medium Severity -
SRG-APP-000343
<GroupDescription></GroupDescription>Group -
The container platform must audit the execution of privileged functions.
<VulnDiscussion>Privileged functions within the container platform can be component specific or can envelope the entire container platform. B...Rule Medium Severity -
SRG-APP-000345
<GroupDescription></GroupDescription>Group -
The container platform must automatically lock an account until the locked account is released by an administrator when three unsuccessful login attempts in 15 minutes are exceeded.
<VulnDiscussion>By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The container platform must provide the configuration for organization-identified individuals or roles to change the auditing to be performed on all components, based on all selectable event criteria within organization-defined time thresholds.
<VulnDiscussion>Auditing requirements may change per organization or situation within and organization. With the container platform allowing ...Rule Medium Severity -
SRG-APP-000357
<GroupDescription></GroupDescription>Group -
SRG-APP-000378
<GroupDescription></GroupDescription>Group -
The container platform must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
<VulnDiscussion>In order to ensure applications have a sufficient storage capacity in which to write the audit logs, applications need to be ...Rule Medium Severity -
SRG-APP-000358
<GroupDescription></GroupDescription>Group -
Audit records must be stored at a secondary location.
<VulnDiscussion>Auditable events are used in the investigation of incidents and must be protected from being deleted or altered. Often, event...Rule Medium Severity -
SRG-APP-000359
<GroupDescription></GroupDescription>Group -
The container platform must provide an immediate warning to the SA and ISSO (at a minimum) when allocated audit record storage volume reaches 75 percent of repository maximum audit record storage capacity.
<VulnDiscussion>If security personnel are not notified immediately upon storage volume utilization reaching 75 percent, they are unable to pl...Rule Medium Severity -
SRG-APP-000360
<GroupDescription></GroupDescription>Group -
The container platform must provide an immediate real-time alert to the SA and ISSO, at a minimum, of all audit failure events requiring real-time alerts.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-APP-000374
<GroupDescription></GroupDescription>Group -
All audit records must use UTC or GMT time stamps.
<VulnDiscussion>The container platform and its components must generate audit records using either Coordinated Universal Time (UTC) or Greenw...Rule Medium Severity -
SRG-APP-000375
<GroupDescription></GroupDescription>Group -
The container platform must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data and images. The...Rule Medium Severity -
The container platform runtime must prohibit the instantiation of container images without explicit privileged status.
<VulnDiscussion>Controlling access to those users and roles responsible for container image instantiation reduces the risk of untested or pot...Rule High Severity -
SRG-APP-000378
<GroupDescription></GroupDescription>Group -
The container platform registry must prohibit installation or modification of container images without explicit privileged status.
<VulnDiscussion>Controlling access to those users and roles that perform container platform registry functions reduces the risk of untested o...Rule Medium Severity -
SRG-APP-000380
<GroupDescription></GroupDescription>Group -
The container platform must enforce access restrictions for container platform configuration changes.
<VulnDiscussion>Configuration changes cause the container platform to change the way it operates. These changes can be used to improve the sy...Rule Medium Severity -
SRG-APP-000381
<GroupDescription></GroupDescription>Group -
The container platform must enforce access restrictions and support auditing of the enforcement actions.
<VulnDiscussion>Auditing the enforcement of access restrictions against changes to the container platform helps identify attacks and provides...Rule Medium Severity -
SRG-APP-000383
<GroupDescription></GroupDescription>Group -
All non-essential, unnecessary, and unsecure DoD ports, protocols, and services must be disabled in the container platform.
<VulnDiscussion>To properly offer services to the user and to orchestrate containers, the container platform may offer services that use port...Rule Medium Severity -
SRG-APP-000384
<GroupDescription></GroupDescription>Group -
SRG-APP-000429
<GroupDescription></GroupDescription>Group -
The container platform must prevent component execution in accordance with organization-defined policies regarding software program usage and restrictions, and/or rules authorizing the terms and conditions of software program usage.
<VulnDiscussion>The container platform may offer components such as DNS services, firewall services, router services, or web services that ar...Rule Medium Severity -
SRG-APP-000386
<GroupDescription></GroupDescription>Group -
The container platform registry must employ a deny-all, permit-by-exception (whitelist) policy to allow only authorized container images in the container platform.
<VulnDiscussion>Controlling the sources where container images can be pulled from allows the organization to define what software can be run ...Rule Medium Severity -
SRG-APP-000391
<GroupDescription></GroupDescription>Group -
The container platform must be configured to use multi-factor authentication for user authentication.
<VulnDiscussion>Controlling access to the container platform and its components is paramount in having a secure and stable system. Validating...Rule Medium Severity -
SRG-APP-000400
<GroupDescription></GroupDescription>Group -
The container platform must prohibit the use of cached authenticators after an organization-defined time period.
<VulnDiscussion>If cached authentication information is out of date, the validity of the authentication information may be questionable.</...Rule Medium Severity -
SRG-APP-000401
<GroupDescription></GroupDescription>Group -
The container platform, for PKI-based authentication, must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.
<VulnDiscussion>The potential of allowing access to users who are no longer authorized (have revoked certificates) increases unless a local ...Rule Medium Severity -
SRG-APP-000402
<GroupDescription></GroupDescription>Group -
The container platform keystore must implement encryption to prevent unauthorized disclosure of information at rest within the container platform.
<VulnDiscussion>Container platform keystore is used for container deployments for persistent storage of all its REST API objects. These objec...Rule Medium Severity -
The container platform must accept Personal Identity Verification (PIV) credentials from other federal agencies.
<VulnDiscussion>Controlling access to the container platform and its components is paramount in having a secure and stable system. Validating...Rule Medium Severity -
SRG-APP-000409
<GroupDescription></GroupDescription>Group -
The container platform must audit non-local maintenance and diagnostic sessions' organization-defined audit events associated with non-local maintenance.
<VulnDiscussion>To fully investigate an attack, it is important to understand the event and those events taking place during the same time pe...Rule Medium Severity -
SRG-APP-000411
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.